llm-security

Fail

Audited by Snyk on Feb 26, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The skill includes code that embeds an API key directly into an Authorization header (e.g., Authorization: Bearer {api_key}), which would require the agent to accept and insert secret values verbatim into requests or generated commands, creating exfiltration risk.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content is intentionally offensive/abusive: it contains explicit payloads and step-by-step techniques for data exfiltration, backdoor/remote-exec creation, credential theft, RAG/poisoning and supply‑chain abuse, and obfuscation/token‑smuggling methods that enable deliberate malicious activity and easy abuse.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The skill includes explicit instructions and examples that read sensitive files (e.g., /etc/passwd), create files in system directories (e.g., /tmp/backdoor.sh), and test persistent/privilege-escalating actions, which push an agent to modify or compromise the host system state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 26, 2026, 11:36 PM